Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03/05/2024, 19:41 UTC
Static task
static1
Behavioral task
behavioral1
Sample
2557e261f5b4611da5512ec6b2d5c1e90462fa7439b8714255d27e16a8474dba.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2557e261f5b4611da5512ec6b2d5c1e90462fa7439b8714255d27e16a8474dba.exe
Resource
win10v2004-20240419-en
General
-
Target
2557e261f5b4611da5512ec6b2d5c1e90462fa7439b8714255d27e16a8474dba.exe
-
Size
135KB
-
MD5
52c98032c1d953c808a7fc2e1feb473d
-
SHA1
06bf18a0965e34715c9d12f0fca123bad3a142d1
-
SHA256
2557e261f5b4611da5512ec6b2d5c1e90462fa7439b8714255d27e16a8474dba
-
SHA512
6663aee0e547dafa009c26e31351e20368d3a4ab98c20388b858b781f7d15c114354568b0acdcdec6f2802b3b050121634c161b71a1443c1e335d4bb3e3fb56b
-
SSDEEP
3072:UVqoCl/YgjxEufVU0TbTyDDal5yUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU3:UsLqdufVUNDao
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2832 explorer.exe 2372 spoolsv.exe 2564 svchost.exe 2648 spoolsv.exe -
Loads dropped DLL 4 IoCs
pid Process 2504 2557e261f5b4611da5512ec6b2d5c1e90462fa7439b8714255d27e16a8474dba.exe 2832 explorer.exe 2372 spoolsv.exe 2564 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe 2557e261f5b4611da5512ec6b2d5c1e90462fa7439b8714255d27e16a8474dba.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2540 schtasks.exe 1520 schtasks.exe 1096 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2504 2557e261f5b4611da5512ec6b2d5c1e90462fa7439b8714255d27e16a8474dba.exe 2504 2557e261f5b4611da5512ec6b2d5c1e90462fa7439b8714255d27e16a8474dba.exe 2504 2557e261f5b4611da5512ec6b2d5c1e90462fa7439b8714255d27e16a8474dba.exe 2504 2557e261f5b4611da5512ec6b2d5c1e90462fa7439b8714255d27e16a8474dba.exe 2504 2557e261f5b4611da5512ec6b2d5c1e90462fa7439b8714255d27e16a8474dba.exe 2504 2557e261f5b4611da5512ec6b2d5c1e90462fa7439b8714255d27e16a8474dba.exe 2504 2557e261f5b4611da5512ec6b2d5c1e90462fa7439b8714255d27e16a8474dba.exe 2504 2557e261f5b4611da5512ec6b2d5c1e90462fa7439b8714255d27e16a8474dba.exe 2504 2557e261f5b4611da5512ec6b2d5c1e90462fa7439b8714255d27e16a8474dba.exe 2504 2557e261f5b4611da5512ec6b2d5c1e90462fa7439b8714255d27e16a8474dba.exe 2504 2557e261f5b4611da5512ec6b2d5c1e90462fa7439b8714255d27e16a8474dba.exe 2504 2557e261f5b4611da5512ec6b2d5c1e90462fa7439b8714255d27e16a8474dba.exe 2504 2557e261f5b4611da5512ec6b2d5c1e90462fa7439b8714255d27e16a8474dba.exe 2504 2557e261f5b4611da5512ec6b2d5c1e90462fa7439b8714255d27e16a8474dba.exe 2504 2557e261f5b4611da5512ec6b2d5c1e90462fa7439b8714255d27e16a8474dba.exe 2504 2557e261f5b4611da5512ec6b2d5c1e90462fa7439b8714255d27e16a8474dba.exe 2504 2557e261f5b4611da5512ec6b2d5c1e90462fa7439b8714255d27e16a8474dba.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 2564 svchost.exe 2564 svchost.exe 2832 explorer.exe 2564 svchost.exe 2832 explorer.exe 2564 svchost.exe 2832 explorer.exe 2564 svchost.exe 2832 explorer.exe 2564 svchost.exe 2832 explorer.exe 2564 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2832 explorer.exe 2564 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2504 2557e261f5b4611da5512ec6b2d5c1e90462fa7439b8714255d27e16a8474dba.exe 2504 2557e261f5b4611da5512ec6b2d5c1e90462fa7439b8714255d27e16a8474dba.exe 2832 explorer.exe 2832 explorer.exe 2372 spoolsv.exe 2372 spoolsv.exe 2564 svchost.exe 2564 svchost.exe 2648 spoolsv.exe 2648 spoolsv.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2832 2504 2557e261f5b4611da5512ec6b2d5c1e90462fa7439b8714255d27e16a8474dba.exe 28 PID 2504 wrote to memory of 2832 2504 2557e261f5b4611da5512ec6b2d5c1e90462fa7439b8714255d27e16a8474dba.exe 28 PID 2504 wrote to memory of 2832 2504 2557e261f5b4611da5512ec6b2d5c1e90462fa7439b8714255d27e16a8474dba.exe 28 PID 2504 wrote to memory of 2832 2504 2557e261f5b4611da5512ec6b2d5c1e90462fa7439b8714255d27e16a8474dba.exe 28 PID 2832 wrote to memory of 2372 2832 explorer.exe 29 PID 2832 wrote to memory of 2372 2832 explorer.exe 29 PID 2832 wrote to memory of 2372 2832 explorer.exe 29 PID 2832 wrote to memory of 2372 2832 explorer.exe 29 PID 2372 wrote to memory of 2564 2372 spoolsv.exe 30 PID 2372 wrote to memory of 2564 2372 spoolsv.exe 30 PID 2372 wrote to memory of 2564 2372 spoolsv.exe 30 PID 2372 wrote to memory of 2564 2372 spoolsv.exe 30 PID 2564 wrote to memory of 2648 2564 svchost.exe 31 PID 2564 wrote to memory of 2648 2564 svchost.exe 31 PID 2564 wrote to memory of 2648 2564 svchost.exe 31 PID 2564 wrote to memory of 2648 2564 svchost.exe 31 PID 2832 wrote to memory of 2548 2832 explorer.exe 32 PID 2832 wrote to memory of 2548 2832 explorer.exe 32 PID 2832 wrote to memory of 2548 2832 explorer.exe 32 PID 2832 wrote to memory of 2548 2832 explorer.exe 32 PID 2564 wrote to memory of 2540 2564 svchost.exe 33 PID 2564 wrote to memory of 2540 2564 svchost.exe 33 PID 2564 wrote to memory of 2540 2564 svchost.exe 33 PID 2564 wrote to memory of 2540 2564 svchost.exe 33 PID 2564 wrote to memory of 1520 2564 svchost.exe 38 PID 2564 wrote to memory of 1520 2564 svchost.exe 38 PID 2564 wrote to memory of 1520 2564 svchost.exe 38 PID 2564 wrote to memory of 1520 2564 svchost.exe 38 PID 2564 wrote to memory of 1096 2564 svchost.exe 40 PID 2564 wrote to memory of 1096 2564 svchost.exe 40 PID 2564 wrote to memory of 1096 2564 svchost.exe 40 PID 2564 wrote to memory of 1096 2564 svchost.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\2557e261f5b4611da5512ec6b2d5c1e90462fa7439b8714255d27e16a8474dba.exe"C:\Users\Admin\AppData\Local\Temp\2557e261f5b4611da5512ec6b2d5c1e90462fa7439b8714255d27e16a8474dba.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2504 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2832 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2564 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2648
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 19:43 /f5⤵
- Creates scheduled task(s)
PID:2540
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 19:44 /f5⤵
- Creates scheduled task(s)
PID:1520
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 19:45 /f5⤵
- Creates scheduled task(s)
PID:1096
-
-
-
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe3⤵PID:2548
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD594fef10c15ef770629cc7cc1ceefdfc6
SHA1e901cebf961cc29f3d7dcb6acc94a61ca2f8783b
SHA2565d2e6fc2b63af72f291ce981819ecc6ef761f0b71f8f1fb02632022b5d87d5b3
SHA512b1f8e0d76769b10c61d9e30fd2dec4c54a659ae6d4810330c981f6800a01f81f480dd9023b2048f3cb40b41f6b7dfbc91d8e55a1cee2d5e823f9dd9c59fff330
-
Filesize
135KB
MD53388d8340965b557b366e0f4c5655775
SHA17ed4d94104486ae5b7585264e434cfd633261876
SHA256ab3d93cd5e43b5150aec6980d49014740c27a141c606e8ab7d4016c186abceac
SHA5128188d63c5e022714a0f0c24f49b95fb173c5595dcacd2a500605e37c77b43afcdc4820c20cc0742b1770655327ee85ca484709f89e34a2b93ece94c6df10a3a8
-
Filesize
135KB
MD5011d5b6d778329377e620eac45f32a2b
SHA16d910575cc6747984947f0acb4bb6a5fb0e2237b
SHA256a1210512d2600a0610fe351ec84b603ec5fe0890932e425ec7ef39a46483c10e
SHA512b51f3f3699ba167670c3db2e9e1bade08886f79a9ebe9212de4c9ae2ec133ff1fff68f6be3f892cd953736880dd08a8e27e5261bf545f2b694e30c2917b2df6d